







Frequently Asked Questions About Pentests
In addition to a general explanation of pentests and the pentesting process, you will find answers to questions that we are frequently asked by our customers. If you still have any questions, please contact us directly.
- Why should we conduct a penetration test?
- What is the workflow of a penetration test?
- How is RedTeam Pentesting different from other companies that offer penetration tests?
- Why does RedTeam Pentesting not offer any additional services or products besides penetration testing?
- How much information does RedTeam Pentesting need from us?
- What are closed box and open box tests?
- What types of systems does RedTeam Pentesting test?
- Why should not only the network perimeter be tested, but also the internal network?
- Does RedTeam Pentesting do social engineering?
- Can any harm be done to our productive systems during the test?
- Are denial-of-service attacks also tested?
- What time investment do you estimate for a penetration test?
- What happens to confidential data RedTeam Pentesting gathers during the penetration test?
- Are the results written down in a report?
- Can we get a list of RedTeam Pentesting's references?
- Are there legal requirements for penetration tests?
- In what countries does RedTeam Pentesting offer penetration tests?